Sciweavers

548 search results - page 8 / 110
» Secure peer sampling
Sort
View
65
Voted
ESORICS
2008
Springer
15 years 2 months ago
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
Carlton R. Davis, Stephen Neville, José M. ...
113
Voted
SAC
2010
ACM
15 years 7 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
73
Voted
P2P
2008
IEEE
15 years 6 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...
78
Voted
CISIS
2009
IEEE
15 years 7 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
118
Voted
SDMW
2004
Springer
15 years 5 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...